lanmaster53 / honeybadger
☆229Updated 5 years ago
Alternatives and similar repositories for honeybadger:
Users that are interested in honeybadger are comparing it to the libraries listed below
- ☆197Updated 3 years ago
- The aim of Wordsmith is to assist with creating tailored wordlists. This is mostly based on geolocation.☆166Updated 6 years ago
- Evolving directions on building the best Open Source Forensics VM☆159Updated 6 years ago
- Resources for Building Virtual Machine Labs Live Training. YEET.☆125Updated 5 years ago
- ☆133Updated 3 years ago
- Passive service locator, a python sniffer that identifies servers, clients, names and much more☆250Updated 2 years ago
- Passive internal reconnaissance tool☆69Updated 2 years ago
- Web application to create indexes for GIAC certification examinations.☆134Updated last year
- A collection of Ansible Playbooks that configure Kali to use Fish & install a number of tools☆161Updated 5 years ago
- ☆206Updated 6 years ago
- CCDC: A collaboration between schools to share CCDC knowledge☆47Updated 8 years ago
- Credential and Red Teaming Defense for Windows Environments☆324Updated 7 months ago
- Notes, Slides, Comments and Commands on How to Win CCDC☆130Updated last month
- Intelligence and Reconnaissance Package/Bundle installer.☆236Updated 4 years ago
- Get your APT on using social media as a tool for data exfiltration.☆145Updated 2 years ago
- 'Packet Capture Forensic Evidence eXtractor' is a tool that finds and extracts files from packet capture files☆219Updated 5 years ago
- Brian's Pentesting and Technical Tips for You☆120Updated 6 months ago
- ☆234Updated 4 years ago
- Professionally Evil Web Application Penetration Testing 101☆142Updated 4 years ago
- HAT (Hashcat Automation Tool) - An Automated Hashcat Tool for common wordlists and rules to speed up the process of cracking hashes duri…☆298Updated 8 months ago
- Python3 library and command line for GreyNoise☆152Updated 3 months ago
- Identifies physical locations where a laptop has been based upon wireless profiles and wireless data recorded in event logs☆90Updated 3 years ago
- GreyNoise Query Language☆82Updated 5 years ago
- ☆54Updated 4 years ago
- The TrustedSec Attack Platform is a reliable method for droppers on an infrastructure in order to ensure established connections to an or…☆379Updated 2 years ago
- This is a collection of legal wording and documentation used for physical security assessments. The goal is to hopefully allow this as a …☆473Updated 5 years ago
- A modular recon tool for pentesting☆234Updated 6 years ago
- ☆190Updated 8 months ago
- ☆73Updated 7 years ago
- LinkedIn reconnaissance tool☆51Updated 3 years ago